archives

scar

Scar de Courcier is an assistant editor at Forensic Focus.
scar has written 129 posts for Forensic Focus – Articles

Database of Software “Fingerprints” Expands to Include Computer Games

by Richard Press, NIST One of the largest software libraries in the world just grew larger. The National Software Reference Library (NSRL), which archives copies of the world’s most widely installed software titles, has expanded to include computer game software from three popular PC gaming distribution platforms—Steam, Origin and Blizzard. The NSRL, which is maintained by … Continue reading

ICDF2C 2018 – New Orleans September 10-12

From the 10th to the 12th of September 2018, Forensic Focus will be attending ICDF2C in New Orleans.Below is an overview of the subjects and speakers that will be featured at the conference. If there are any topics you’d particularly like us to cover, or any speakers you think we should interview, please let us … Continue reading

Drone Forensics Gets A Boost With New Data On NIST Website

by Richard Press, NIST Aerial drones might someday deliver online purchases to your home. But in some prisons, drone delivery is already a thing. Drones have been spotted flying drugs, cell phones and other contraband over prison walls, and in several cases, drug traffickers have used drones to ferry narcotics across the border. If those … Continue reading

Have Your Say In The House Of Lords’ Select Committee On Science And Technology

Controversy has been raging around ISO 17025 ever since the standard was adopted for digital forensics back in October 2017. Although many people who work in the industry agree that standardisation is advisable and probably necessary if we are to keep moving forward, there have been many criticisms of ISO 17025 and its effectiveness when … Continue reading

Reducing The Mental Stress Of Investigators

by Eric Oldenburg, Griffeye  We recently met up with Eric Oldenburg, Griffeye’s new Law Enforcement Liasion in North America, and heard about his new role. Here, he explains how reducing mental stress for investigators is a driving force for him, one that led him to work for Griffeye, and why the mental health of investigators is … Continue reading

Giving Back In DFIR

by Jessica Hyde, Magnet Forensics A few months back I was on my way to BSides NoVa, having a conversation with someone competing in the CTF about where his team would donate the prize money to if they won. I suggested some organizations related to helping young people learn about Information Security. A few hours later, … Continue reading

Techno Security & Digital Forensics 2018 – San Antonio September 17-19

From the 17th to the 19th of September 2018, Forensic Focus will be attending the Techno Security & Digital Forensics Conference in San Antonio, Texas, USA. If there are any topics you’d particularly like us to cover, or any speakers you think we should interview, please let us know in the comments. Below is an overview of … Continue reading

Using IMAP Internal Date for Forensic Email Authentication

by Arman Gungor Internal Date is an IMAP Message Attribute that indicates the internal date and time of a message on an IMAP server. This is a different timestamp than the Origination Date field found in the message header and can be instrumental in authenticating email messages on an IMAP server. Let’s start with an example. The perpetrator … Continue reading

Electromagnetic Side-Channel A‚ttacks: Potential For Progressing Hindered Digital Forensic Analysis

by Asanka Sayakkara, Nhien-An Le-Khac & Mark Scanlon Abstract Digital forensics is a fast-growing €field involving the discovery and analysis of digital evidence acquired from electronic devices to assist investigations for law enforcement. Traditional digital forensic investigative approaches are o‰ften hampered by the data contained on these devices being encrypted. Furthermore, the increasing use of IoT devices with … Continue reading

Deep Learning At The Shallow End: Malware Classification For Non-Domain Experts

by Quan Le, Oisín Boydell, Brian Mac Namee & Mark Scanlon Abstract Current malware detection and classification approaches generally rely on time consuming and knowledge intensive processes to extract patterns (signatures) and behaviors from malware, which are then used for identification. Moreover, these signatures are often limited to local, contiguous sequences within the data whilst … Continue reading

Evaluating Automated Facial Age Estimation Techniques For Digital Forensics

by Felix Anda, David Lillis, Nhien-An Le-Khac & Mark Scanlon Abstract In today’s world, closed circuit television, cellphone photographs and videos, open-source intelligence (i.e., social media/web data mining), and other sources of photographic evidence are commonly used by police forces to identify suspects and victims of both online and offline crimes. Human characteristics, such as … Continue reading

Techno Security Myrtle Beach 2018 – Recap

by Scar de Courcier This article is a recap of some of the main highlights from the Techno Security & Forensic Investigation Conference 2018, which took place in Myrtle Beach, SC from the 3rd-6th June 2018. Under the sunny skies of South Carolina, the digital forensic community got together at the beginning of June this year … Continue reading

Apple iPhone Forensics: Significant Locations

by Patrick Siewert, Principal Consultant, Pro Digital Forensic Consulting I recently attended a conference of civil litigators in Virginia. During the cocktail hour and after a very interactive CLE presentation on “Leveraging Data in Insurance Fraud Investigations”, I was talking with a few attendees about the different types of data available to them in their … Continue reading

Digital Forensics Resources

by Scar de Courcier One of the most frequent questions I’m asked by digital forensics students is about resources: where can they go to continue learning, where can they find out more about the industry, what are the best blogs and social accounts out there for DFIR people? The below is by no means an … Continue reading

ADR512 Testing

by Andrey Fedorov The purpose of this article is to find additional information about the capabilities, specifics, and USPs of the ADR512 Android Data Recovery program. A full description of this software can be found here. Developers from 512 BYTE, who created the software, invited specialists from digital forensics lab Gross to test it.  Let’s … Continue reading

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,152 other followers